共 50 条
- [31] Sybil defenses in DHT networks based on social relationships Qinghua Daxue Xuebao/Journal of Tsinghua University, 2014, 54 (01): : 1 - 7
- [32] On The Effectiveness of Sybil Defenses Based on Online Social Networks 2013 21ST IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2013,
- [33] User Interactions in Social Networks and their Implications EUROSYS'09: PROCEEDINGS OF THE FOURTH EUROSYS CONFERENCE, 2009, : 205 - 218
- [34] A Novel Two-Stage Framework for User Identification Across Social Networks 2019 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND BIG DATA (ICAIBD 2019), 2019, : 266 - 270
- [35] Evaluating Sybil Attacks in P2P Infrastructures for Online Social Networks 2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1262 - 1267
- [37] Similarity-Based User Identification Across Social Networks SIMILARITY-BASED PATTERN RECOGNITION, SIMBAD 2015, 2015, 9370 : 171 - 185
- [38] Using radio device fingerprinting for the detection of impersonation and Sybil attacks in wireless networks SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, 2006, 4357 : 179 - 192
- [39] Exploiting User Friendship Networks for User Identification across Social Networks SYMMETRY-BASEL, 2022, 14 (01):